Information Assurance Specialist (Hybrid)
Information systems security officer job at SiloSmashers
Clearance: Must be a U.S. citizen and able to obtain and maintain DHS suitability clearance, as required by federal contract. The Information Assurance Specialist will ensure DHS CISA systems comply with cybersecurity, risk management, and federal information security requirements. This role supports system authorization, audit readiness, and continuous monitoring activities.
Responsibilities:
* Conduct security control assessments based on the Risk Management Framework (RMF).
* Prepare and maintain accreditation and certification documentation.
* Advise development and operations teams on information assurance best practices.
* Support audits and compliance reporting for DHS and federal mandates.
* Collaborate with stakeholders to implement corrective actions and maintain security posture.
Qualifications:
* Bachelor's degree in Cybersecurity, Information Technology, or related field.
* 5+ years of experience in information assurance, cybersecurity compliance, or related role.
* Strong knowledge of FISMA, RMF, and NIST SP 800-53 frameworks.
* Security+ or CISSP certification required.
* Excellent written and verbal communication skills.
Chief Information Security Officer
Washington, DC jobs
Chief Information Security Officer (CISO)
The Chief Information Security Officer is a senior executive responsible for defining and overseeing the enterprise-wide vision, strategy, and execution of information security programs that safeguard all organizational data and technology. Reporting directly to the CEO and/or Board of Directors, the CISO plays a pivotal role in managing security risk across both the Academic/Research and Clinical/Patient Care operations of the integrated university and hospital system.
Position Details
Salary: $250-2750k
Type: Full-time, direct hire
Location: Washington DC, onsite 3 days a week
Strategic Direction & Executive Leadership
Build and execute a long-term cybersecurity vision that supports the institution's academic initiatives, research priorities, and clinical mission.
Lead and develop the security department, offering coaching, structure, and direction to cybersecurity personnel and partner teams.
Establish the organization's security policies, governance models, and standards to ensure consistent risk management practices.
Oversee financial planning for cybersecurity, including technology investments, service contracts, and budget management.
Risk Oversight & Regulatory Alignment
Supervise all risk assessments, compliance reviews, and internal/external audits, ensuring timely closure of any identified risks.
Maintain adherence to all regulatory requirements applicable to both sectors:
Hospital/Clinical: HIPAA/HITECH, CMS guidelines, and relevant state-level data protection rules.
University/Research: FERPA, NIST SP 800-171 for research compliance, and PCI DSS for payment and donation processing.
Direct the institution's incident management program-coordinating preparation, testing, and response efforts during cybersecurity events affecting either environment.
Operational Security Management
Lead the selection, deployment, and ongoing support of cybersecurity technologies (e.g., SIEM tools, firewalls, intrusion detection systems, endpoint protection).
Oversee vulnerability assessments, penetration testing initiatives, and continuous monitoring activities.
Work closely with IT, engineering, research teams, and clinical technology leaders to incorporate secure design principles into all systems and projects.
Communication, Influence & Education
Act as the organization's primary authority on cybersecurity matters for executives, trustees, faculty, students, clinicians, and administrative teams.
Create and oversee training and awareness programs tailored to the specific needs of academic users, researchers handling sensitive data, and clinical professionals.
Provide routine briefings to senior leadership and the Board on emerging risks, ongoing initiatives, and the overall security posture.
Required Qualifications
Education:
Bachelor's degree in Computer Science, Information Systems, or a related technical field (Master's preferred).
Professional Background:
At least 10 years of progressive cybersecurity experience.
Minimum 5 years serving in a senior leadership capacity (e.g., CISO, Security Executive, VP of Cybersecurity).
Dual-sector experience: Strong understanding of both healthcare and higher-education cybersecurity and regulatory environments.
Certifications: One or more required-CISSP, CISM, or equivalent.
Key Skills & Core Competencies
Advanced knowledge of enterprise security design, network and cloud protection strategies, and modern risk evaluation techniques.
Strong familiarity with frameworks such as NIST Cybersecurity Framework, ISO 27001, and the MITRE ATT&CK model.
Outstanding leadership presence with the ability to collaborate, influence, and guide diverse groups across a complex institution.
Demonstrated success in leading security incident response efforts and handling high-pressure situations.
Proven ability to implement practical, scalable security practices in environments balancing open research culture with rigorous patient data protection requirements.
Cyber Security Engineer
Arlington, VA jobs
We are seeking a Cybersecurity Engineer with strong, hands-on experience implementing Data Loss Prevention (DLP) solutions, specifically using Azure Purview and Microsoft Intune. This role requires a technical practitioner who has directly deployed, configured, and operationalized security controls-not just monitored events. The engineer will design and implement secure architectures across cloud and hybrid environments, conduct threat modeling, integrate security into new platforms, and ensure alignment with industry best practices and regulatory frameworks such as NIST 800-53, FISMA, and FedRAMP.
The ideal candidate must have 10+ years of experience that brings advanced knowledge of cloud security, IAM, encryption, authentication protocols, and modern DevSecOps practices. Additional responsibilities include developing reusable security patterns, performing architecture reviews, enhancing automation, and partnering with IT teams to mature the organization's security posture. Strong communication skills, deep technical proficiency, and experience with Azure/AWS infrastructures are essential for success in this role.
This is an onsite direct hire opportunity in Arlington, VA, no contract, no sponsorship. Relocation assistance provided within the US.
LI #HP-1
Information System Security Engineer
Washington, DC jobs
ISSO
Industry: Government Contracting
Our client is seeking a talented ISSO to join their team. This position will support the Assistant Secretary for Administration (ASA) under guidance from the CIO's Information System Security Manager (ISSM). The candidate will ensure a portfolio of 4 systems are in compliance with applicable NIST standards, and provide standard ISSO services. The candidate will also work closely with the other ISSOs supporting the client customers to provide leadership and mentoring and ensure consistent delivery of ISSO services.
ISSO Key Responsibilities:
· Ensure applicable cybersecurity policies are implemented for systems and information system-related physical security also under purview.
· Maintain operational security posture consistent with current security policy.
· Report actual or suspected computer-security incidents to DOT CSIRC within time frames established by DOT Incident Response policy for incident types in accordance with US-CERT.
· Distribute cybersecurity notices and advisories to appropriate personnel and that vendor-issued security patches are expeditiously installed.
· Serve as primary security to system owners, common control providers, and users.
· Serve as focal point for cybersecurity incident reporting and subsequent resolution.
· Assisting ISSM in reviewing contracts for information systems under the Component's control to ensure that cybersecurity is appropriately addressed in contract language.
· Ensure all security-related SDLC documentation meets all identified security needs.
· Maintain Security Assessment and Authorization (SA&A) documentation for information systems under purview according to DoT Cybersecurity Policy and Compendium.
· Ensure selection of NIST SP 800-53 baseline security controls are appropriate for system based on FIPS 199 security categorization, NIST SP 800-53 guidance, and supplemental DOT policy specified in DoT Cybersecurity Compendium.
· Assist System Owner, Information Owner, and ISSM in recording all known security weaknesses of assigned information systems in POA&Ms IAW DoT policy and procedures.
· Track all security education and awareness training conducted for personnel and contractors, as required by DoT Cybersecurity Policy and Compendium.
· Provide security advice to AO and System Owner on all matters (technical and otherwise) involving security of the information system.
· Ensure required updates are performed to key documents in accordance with NIST SP 800-37 for continuous monitoring.
· Identify changes to systems that may impact security controls, perform security impact assessment of proposed changes, report any change in risk posture, and provide recommendations for risk mitigation.
· Ensure proper backup procedures exist for assigned information systems and that procedures are performed and tested in accordance with System Security Plan.
· Assist System Owner and ISSM to ensure external connections to/from DoT information systems and networks are provided by an approved DoT Trusted Internet Connection Access Provider (TICAP) or DoT-approved Managed TIC Provider Service (MTIPS).
· Ensure audit logs are captured, maintained, and analyzed as required by NIST SP 800- 53 and any supplemental Departmental Cybersecurity Policy and the Compendium.
· Ensure DoT enterprise information security management system (CSAM or its successors) accurately contains required information system inventory, categorization, POA&Ms and other security metrics required by DoT CIO through this policy.
· Complete mandatory annual specialized information security training.
ISSO Required Skills:8+ years of experience in IT Security
Certified Information Systems Security Professional (CISSP) certification.
Understanding of NIST 800.53 and its applicability to IT Systems.
Expertise with Risk Management Framework, FEDRAMP and FISMA.
Understanding authentication in the cloud environment.
Experience with continuous monitoring of a cloud system
Experience working on assessments with third party assessments organization (3PAO)
AWS/Azure associate certified
ISSO Compensation and benefits: $120,000
Company-supported medical, dental, vision, life, STD, and LTD insurance
Benefits include 10 federal holidays and PTO.
401(k) with company matching
Flexible Spending Accounts for commuter, medical, and dependent care expenses
Tuition Assistance
Information Systems Security Officer (ISSO)
Washington, DC jobs
At Accenture Federal Services, nothing matters more than helping the US federal government make the nation stronger and safer and life better for people. Our 13,000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations.
Join Accenture Federal Services, a technology company and part of global Accenture, to do work that matters in a collaborative and caring community, where you feel like you belong and are empowered to grow, learn and thrive through hands-on experience, certifications, industry training and more.
Join us to drive positive, lasting change that moves missions and the government forward!
As an **Information Systems Security Officer (ISSO),** you'll be responsible for guiding government clients through the intricate process of obtaining and maintaining ATO certifications for their information systems.
**Responsibilities include:**
+ You will leverage your expertise in government cybersecurity standards and regulations to monitor, analyze, and respond to potential security incidents and threats.
+ Your role will ensure that our government clients' systems meet the stringent security requirements necessary for ATO compliance while aligning with government-specific cybersecurity guidelines. What you'll do: Collaborate with government clients to thoroughly understand their system architectures, security requirements, and objectives for achieving and maintaining ATO status within the context of government regulations.
+ Conduct exhaustive security assessments and risk analyses that cater to government system compliance, identifying vulnerabilities and potential threats specific to government systems.
+ Monitor security systems, logs, and network traffic with a keen focus on government cybersecurity guidelines, identifying any suspicious activity, intrusions, or unauthorized access attempts.
+ Collaborate closely with cross-functional teams to establish and maintain government-aligned security measures, including firewalls, intrusion detection systems, data encryption, and access controls. Investigate and analyze security incidents to determine their cause, impact, and appropriate response.
+ Develop and implement incident response plans, including containment, eradication, and recovery strategies.
**Here is what you need:**
+ 7 years of experience as a cybersecurity analyst with a specialization in Government System ATO support, demonstrating deep knowledge of government ATO principles, methodologies, and tools.
+ Strong experience in government regulatory frameworks, compliance requirements, and security standards specific to ATO (e.g., NIST SP 800-53, RMF, ICD 503, FISMA, FedRAMP).
+ Demonstrated and repeat experience achieving and maintaining ATO for cloud services and solutions from IL5 to IL6+ on NIPR, SIPR, and JWICS.
+ Understanding of network protocols, operating systems, and infrastructure components.
+ Strong proficiency in incident response, security incident handling, and forensic analysis techniques.
+ Expertise with government specific ATO assessment tools, vulnerability scanning tools, and intrusion detection/prevention systems.
+ CISSP or equivalent certification to support DoD 8140 requirements
**Preferred to have:**
+ Effective communication skills, with the ability to convey complex technical concepts to both technical and non-technical stakeholders.
**Security Clearance:**
+ Active TS/SCI with polygraph clearance is required
As required by local law, Accenture Federal Services provides reasonable ranges of compensation for hired roles based on labor costs in the states of **California, Colorado, Hawaii, Illinois, Maryland,** **Massachusetts,** **Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland** . The base pay range for this position in these locations is shown below. Compensation for roles at Accenture Federal Services varies depending on a wide array of factors, including but not limited to office location, role, skill set, and level of experience. Accenture Federal Services offers a wide variety of benefits. You can find more information on benefits here. (********************************************************************* We accept applications on an on-going basis and there is no fixed deadline to apply.
The pay range for the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland is:
$147,300-$182,900 USD
**_What We Believe_**
_As a company wholly dedicated to serving the US federal government, we bring together the best talent to help reinvent how federal agencies operate and deliver greater value for their mission and the American people. We have an unwavering commitment to creating a culture in which all our people are respected, feel a sense of belonging, and have equal opportunity. As a business imperative, every person at Accenture Federal Services has the responsibility to create and sustain a culture where everyone feels welcomed and included. This is grounded in our core values and our experience that hiring and developing great people who reflect different perspectives, experiences, and backgrounds is key to driving innovation and delivering the results that our clients and the country count on._
**_Equal Employment Opportunity Statement_**
_We believe that no one should be discriminated against because of their differences. All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law. Our rich diversity makes us more innovative, more competitive, and more creative, which helps us better serve our clients and our communities. For details, view a copy of the Accenture Federal Services Equal Opportunity Policy Statement. (****************************************************************************
_Accenture Federal Services is an Equal Employment Opportunity employer. Additionally, as an Affirmative Action Employer for Veterans and Individuals with Disabilities, Accenture Federal Services is committed to providing veteran employment opportunities to our service men and women._
**_Requesting An Accommodation_**
_Accenture Federal Services is committed to providing equal employment opportunities for persons with disabilities or religious observances, including reasonable accommodation when needed. If you are hired by Accenture Federal Services and require accommodation to perform the essential functions of your role, you will be asked to participate in our reasonable accommodation process. Accommodations made to facilitate the recruiting process are not a guarantee of future or continued accommodations once hired._
_If you_ **_ _** _are being considered for employment opportunities with Accenture Federal Services and need an accommodation for a disability or religious observance during the interview process or for the job you are interviewing for, please speak with your recruiter._
**_Other Employment Statements_**
_Applicants for employment in the US must have work authorization that does not now or in the future require sponsorship of a visa for employment authorization in the United States._
_Candidates who are currently employed by a client of Accenture Federal Services or an affiliated Accenture business may not be eligible for consideration._
_Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process._
_The Company will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Additionally, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the Company's legal duty to furnish information._
_California requires additional notifications for applicants and employees. If you are a California resident, live in or plan to work from Los Angeles County upon being hired for this position, please click here (********************************************************************************* for additional important information._
Information System Security Officer
Huntsville, AL jobs
Opportunity
PeopleTec is currently seeking an Information System Security Officer to support our Huntsville, AL location.
Job Functions:
Serves as the principal advisor to the Information System Owner (SO), Business Process Owner, and the Chief Information Security Officer (CISO) / Information System Security Manager (ISSM) on all matters, technical and otherwise, involving the security of an information system.
ISSOs are responsible for ensuring the implementation and maintenance of security controls.
Directs and implements the necessary controls and procedures to cost-effectively protect information systems assets from intentional or inadvertent modification, disclosure, or destruction.
Provides guidance and direction for the physical protection of information systems assets to other functional units.
Provides reports to superiors regarding effectiveness of data security and makes recommendations for the adoption of new procedures.
Assist with reviewing, developing, and navigating the system, team, and customer through the Authority to Operate (ATO) accreditation/certification documentation process.
Perform network self-inspections.
Create new and edit existing documentation that forms the Authority to Operate (ATO) package to include the System Security Plan and IS contingency plan.
Develop Plan of Action and Milestone (POAMS) from vulnerability data and enter into the system of record.
Qualifications
Required Skills/Experience:
Junior level: BS degree + 1 yrs experience
Travel: 10 %
Must be a U.S. Citizen
An active DoD Top Secret clearance with SCI eligibility is required to perform this work. Candidates are required to have an active Top Secret clearance with SCI eligibility upon hire, and the ability to maintain this level of clearance during their employment.
Education Requirements:
Bachelor Degree in related field or in lieu of degree 4 additional years of experience
Overview
People First. Technology Always.
PeopleTec, Inc. is an employee-owned small business founded in Huntsville, AL that provides exceptional customer support by employing and retaining a highly skilled workforce.
Culture: The name "PeopleTec" was deliberately chosen to remind us of our core value system - our people. Our company's foundation was built on placing our employees and customers first. With an award-winning atmosphere, we have matured into a company that boasts the best and brightest across multiple technical fields.
Career: At PeopleTec, we value your long-term goals. Whether it's through our continuing-education opportunities, our robust training programs, or our "People First" benefits package, PeopleTec truly believes that our best investments are our people.
Come Experience It.
#cjpost #dpost
EEO Statement
PeopleTec, Inc. is an Equal Employment Opportunity employer and provides reasonable accommodation for qualified individuals with disabilities and disabled veterans in its job application procedures. If you have any difficulty using our online system and you need an accommodation due to a disability, you may use the following email address, *****************************
and/or phone number ************** to contact us about your interest in employment with PeopleTec, Inc.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, genetic information, citizenship, ancestry, marital status, protected veteran status, disability status or any other status protected by federal, state, or local law. PeopleTec, Inc. participates in E-Verify.
Auto-ApplyCyber Threat Analyst
Washington, DC jobs
Central Intelligence Agency Print Share * * * * Save * This job is open to * Requirements * How you will be evaluated * Required documents * How to apply Cyber Threat Analysts conduct all-source analysis of foreign Cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests.
Summary
Cyber Threat Analysts conduct all-source analysis of foreign Cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests.
Overview
Help
Accepting applications
Open & closing dates
10/01/2025 to 09/30/2026
Salary $63,307 to - $156,755 per year Pay scale & grade GS 8 - 15
Location
Many vacancies in the following location:
Washington, DC
Remote job No Telework eligible No Travel Required Occasional travel - You may be expected to travel for this position. Relocation expenses reimbursed Yes-You may qualify for reimbursement of relocation expenses in accordance with agency policy. Appointment type Permanent Work schedule Full-time Service Excepted
Promotion potential
None
Job family (Series)
* 0132 Intelligence
Supervisory status No Security clearance Sensitive Compartmented Information Drug test Yes Financial disclosure Yes Bargaining unit status No
Announcement number 23-11942190-6868/AHD Control number 722102800
This job is open to
Help
The public
U.S. Citizens, Nationals or those who owe allegiance to the U.S.
Federal employees - Competitive service
Current federal employees whose agencies follow the U.S. Office of Personnel Management's hiring rules and pay scales.
Federal employees - Excepted service
Current federal employees whose agencies have their own hiring rules, pay scales and evaluation criteria.
Videos
Duties
Help
As a Cyber Threat Analyst at CIA, you will conduct all-source analysis of foreign cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests.
In particular, you will help identify, monitor, and counter threats posed by foreign cyber actors against US information systems, critical infrastructure, and other cyber-related interests. Analysts will apply their foreign affairs, scientific and/or technical knowledge to solve complex intelligence problems, produce short-term and long-term written assignments, and brief U.S. policymakers and others in the U.S. cyber defense community.
You will have the opportunity to maintain and broaden your professional ties throughout your career through academic study, collaboration with Intelligence Community peers, and attendance at professional meetings.
Opportunities exist for foreign and domestic travel, language training, and analytic tradecraft and management training. You will have an opportunity to develop deep substantive expertise and participate in broadening assignments with other offices in the Agency and across the U.S. Government.
Requirements
Help
Conditions of employment
* You must be physically in the United States or one of its territories when you submit your resume via MyLINK.
* You must be registered for the Selective Service, if applicable.
* You must be a U.S. citizen and at least 18 years of age (dual-national US citizens are eligible).
* You must be willing to move to the Washington, DC area.
* You must successfully complete a thorough medical and psychological exam, a polygraph interview, and a comprehensive background investigation.
* For further information, please visit: ****************************************
Qualifications
Minimum Qualifications
Interested candidates should be passionate about the ideals of our American republic, committed to upholding the rule of law and the U.S. Constitution, and committed to improving the efficiency of the Federal government. Hiring decisions will not be based on race, sex, color, religion, or national origin.
A mix of international and technical studies, to include a bachelor's or master's degree in the following fields:
* International Relations, Foreign Affairs, or Security Studies
* Cyber Security
* Computer Science
* Digital Forensics
* Telecommunications
* Information Assurances
* Interest in international affairs
* Awareness of U.S. national security interests
* At lease a 3.0 GPA on a 4-point scale is preferred
* Ability to work under tight deadlines
* Excellent analytic abilities and relevant experience
* Strong critical thinking, problem solving skills, and ability to think creatively
* Ability to meet the minimum requirements for joining CIA, including U.S. citizenship and a background investigation
Desired Qualifications
* Foreign language proficiency
* Strong verbal presentation skills
* Demonstrated ability to write clear, concise text
* Research experience in international affairs
* Ability to work in a team environment
* Interest in a career that requires regular writing assignments
Education
* Bachelor's or master's degree in one of the following fields:
* Computer Science
* Computer Engineering
* Digital Forensics
* Cyber Security
* Telecommunications
* Information Assurances
* Security Studies
* A mix of international and technical studies
* At least a 3.0 GPA on a 4-point scale is preferred
Additional information
Candidates should be committed to improving the efficiency of the Federal government, passionate about the ideals of our American republic, and committed to upholding the rule of law and the United States Constitution.
Benefits
Help
A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new window Learn more about federal benefits.
Review our benefits
Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.
How you will be evaluated
You will be evaluated for this job based on how well you meet the qualifications above.
For further information about this position, please visit: *****************************
Benefits
Help
A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new window Learn more about federal benefits.
Review our benefits
Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.
Required documents
Required Documents
Help
For further information about this position, please visit: *****************************
If you are relying on your education to meet qualification requirements:
Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education.
Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.
How to Apply
Help
This post is for viewing purposes only. To get started, please visit ***************************** where you can read more about this position and express your interest in up to four jobs. Upon expressing your interest, you will be taken to MyLINK, which allows you to submit your resume and job rankings and provide basic information about yourself.
Agency contact information
Central Intelligence Agency
Website ***********************
Next steps
After you express interest for up to four positions on cia.gov/careers, a CIA recruiter may contact you for further discussion if your qualifications meet our needs. See the MyLINK FAQs on our website for more information.
Fair and transparent
The Federal hiring process is set up to be fair and transparent. Please read the following guidance.
Criminal history inquiries Equal Employment Opportunity (EEO) Policy
Financial suitability New employee probationary period
Privacy Act Reasonable accommodation policy
Selective Service Signature and false statements
Social security number request
Required Documents
Help
For further information about this position, please visit: *****************************
If you are relying on your education to meet qualification requirements:
Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education.
Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.
Mid-Level EAD Cyber Threat Analyst - KOREAN
Herndon, VA jobs
LIS' mission is to provide our customers with strategic, dynamic and Innovative solutions. Versatility, Agility and Scalability are the Defining principles that drive our company to deliver“ Effective Strategies for Successful Solutions” for both our government and Industry partners. LIS, a Woman Owned Small Business, was founded in 1994 as an advanced innovative language service provider. Since then We have organically expanded into Cyber Security, Intelligence and Information Technology to support our customers with their rapidly Evolving global enterprise-wide requirements.
Job Description
LIS is currently looking for individuals to provide targeting and analytic support on East Asian and Korean cyber issues.
In support of a U.S. Government customer, ATS needs mid-level East Asia analyst with Korean language to provide a range of targeting, analytical, support services. Targeter will produce and develop targeting leads and finished intelligence products on EAD regional topics. Korean language skill is required at ILR-3 or better.
Responsibilities:
• Direct and conduct all-source analysis and targeting to identify, monitor, and assess
• Apply expertise to solve complex intelligence problems, produce short-term and long-term written assessments, and conduct briefings
• Apply demonstrated subject matter expertise
• Apply knowledge of regional topics
• Analyze and report on trends and activity
Qualifications
Qualifications:
• Korean Language proficiency at ILR-3 level
• Minimum of 4 years all-source analysis experience with national intelligence agencies or DoD components providing analytic support to aid in foreign threat assessments
• Possess a good understanding of Intelligence Community (IC) guidelines and directives
• Experience conducting all-source analysis of cyber topics
• Be proficient in MS Office programs (Word, Excel, PowerPoint), IC tools and software applications and
Terminology Management Databases
• Any additional experience within the IC and/or dealing with cyber threat issues would certainly be valued, as would experience with translation work.
Requirements:
• U.S. Citizenship
• Active Government Investigation
Additional Information
Benefits
• Medical, Vision, Dental
• Employee Assistance Program (EAP)
• Evacuation
• Long Term Disability
• Term Life
All your information will be kept confidential according to EEO guidelines.
Mid-Level EAD Cyber Threat Analyst - KOREAN
Herndon, VA jobs
LIS' mission is to provide our customers with strategic, dynamic and Innovative solutions. Versatility, Agility and Scalability are the Defining principles that drive our company to deliver“ Effective Strategies for Successful Solutions” for both our government and Industry partners. LIS, a Woman Owned Small Business, was founded in 1994 as an advanced innovative language service provider. Since then We have organically expanded into Cyber Security, Intelligence and Information Technology to support our customers with their rapidly Evolving global enterprise-wide requirements.
Job Description
LIS is currently looking for individuals to provide targeting and analytic support on East Asian and Korean cyber issues.
In support of a U.S. Government customer, ATS needs mid-level East Asia analyst with Korean language to provide a range of targeting, analytical, support services. Targeter will produce and develop targeting leads and finished intelligence products on EAD regional topics. Korean language skill is required at ILR-3 or better.
Responsibilities:
• Direct and conduct all-source analysis and targeting to identify, monitor, and assess
• Apply expertise to solve complex intelligence problems, produce short-term and long-term written assessments, and conduct briefings
• Apply demonstrated subject matter expertise
• Apply knowledge of regional topics
• Analyze and report on trends and activity
Qualifications
Qualifications:
• Korean Language proficiency at ILR-3 level
• Minimum of 4 years all-source analysis experience with national intelligence agencies or DoD components providing analytic support to aid in foreign threat assessments
• Possess a good understanding of Intelligence Community (IC) guidelines and directives
• Experience conducting all-source analysis of cyber topics
• Be proficient in MS Office programs (Word, Excel, PowerPoint), IC tools and software applications and
Terminology Management Databases
• Any additional experience within the IC and/or dealing with cyber threat issues would certainly be valued, as would experience with translation work.
Requirements:
• U.S. Citizenship
• Active Government Investigation
Additional Information
Benefits
• Medical, Vision, Dental
• Employee Assistance Program (EAP)
• Evacuation
• Long Term Disability
• Term Life
All your information will be kept confidential according to EEO guidelines.
Security Researcher
Herndon, VA jobs
At Accenture Federal Services, nothing matters more than helping the US federal government make the nation stronger and safer and life better for people. Our 13,000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations.
Join Accenture Federal Services, a technology company and part of global Accenture, to do work that matters in a collaborative and caring community, where you feel like you belong and are empowered to grow, learn and thrive through hands-on experience, certifications, industry training and more.
Join us to drive positive, lasting change that moves missions and the government forward!
Job Description:
Accenture Federal Services is seeking bold, innovative thinkers to tear apart our world of code and find vulnerabilities. Software and applications, PCs, Macs, Linux and IoT are all the objects of our investigation, so we need someone who likes to solve puzzles and deep dive into new topics to solve some of the most challenging problems. Our projects involve small teams working a variety of research efforts in close coordination with customers. As a technical leader, you will drive vulnerability research (VR) and operational success for our customers
Here's what you need:
* In-depth knowledge of C, C++, Python and Bash scripting; additional languages desired include C#, Java, Swift
* Experience with fuzzer development, AFL, Ida Pro, Ghidra and custom forensic analysis tools
* Academic degree(s) in Computer Science, Cyber Security, Software Engineering, Electrical or Computer Engineering, Physics and/or military training/experience
* Experience reading or writing assembly (x86, x64, ARM, PPC, MIPS, TILE, or others)
* Working experience with Git, GitLab, or Jira
Bonus points if you have:
* Experience utilizing full system emulation for research and analysis
* Experience using VMware vCenter, vSphere
* Experience setting up networking and packet capture in Virtual Machine environments
Security Clearance:
Must have an active TS/SCI level clearance
#clearancejobs
As required by local law, Accenture Federal Services provides reasonable ranges of compensation for hired roles based on labor costs in the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland. The base pay range for this position in these locations is shown below. Compensation for roles at Accenture Federal Services varies depending on a wide array of factors, including but not limited to office location, role, skill set, and level of experience. Accenture Federal Services offers a wide variety of benefits. You can find more information on benefits here. We accept applications on an on-going basis and there is no fixed deadline to apply.
The pay range for the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland is:
$113,500-$234,900 USD
What We Believe
As a company wholly dedicated to serving the US federal government, we bring together the best talent to help reinvent how federal agencies operate and deliver greater value for their mission and the American people. We have an unwavering commitment to creating a culture in which all our people are respected, feel a sense of belonging, and have equal opportunity. As a business imperative, every person at Accenture Federal Services has the responsibility to create and sustain a culture where everyone feels welcomed and included. This is grounded in our core values and our experience that hiring and developing great people who reflect different perspectives, experiences, and backgrounds is key to driving innovation and delivering the results that our clients and the country count on.
Equal Employment Opportunity Statement
We believe that no one should be discriminated against because of their differences. All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law. Our rich diversity makes us more innovative, more competitive, and more creative, which helps us better serve our clients and our communities. For details, view a copy of the Accenture Federal Services Equal Opportunity Policy Statement.
Accenture Federal Services is an Equal Employment Opportunity employer. Additionally, as an Affirmative Action Employer for Veterans and Individuals with Disabilities, Accenture Federal Services is committed to providing veteran employment opportunities to our service men and women.
Requesting An Accommodation
Accenture Federal Services is committed to providing equal employment opportunities for persons with disabilities or religious observances, including reasonable accommodation when needed. If you are hired by Accenture Federal Services and require accommodation to perform the essential functions of your role, you will be asked to participate in our reasonable accommodation process. Accommodations made to facilitate the recruiting process are not a guarantee of future or continued accommodations once hired.
If you are being considered for employment opportunities with Accenture Federal Services and need an accommodation for a disability or religious observance during the interview process or for the job you are interviewing for, please speak with your recruiter.
Other Employment Statements
Applicants for employment in the US must have work authorization that does not now or in the future require sponsorship of a visa for employment authorization in the United States.
Candidates who are currently employed by a client of Accenture Federal Services or an affiliated Accenture business may not be eligible for consideration.
Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process.
The Company will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Additionally, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the Company's legal duty to furnish information.
California requires additional notifications for applicants and employees. If you are a California resident, live in or plan to work from Los Angeles County upon being hired for this position, please click here for additional important information.
Senior Information Assurance (IA) Lead Analyst
Arlington, VA jobs
VOR Technology is a privately held, veteran owned small business that provides Cyber Intelligence Solutions to government, private industry and critical infrastructure. Our areas of expertise include Computer Network Defense (CND), Computer Network Exploitation (CNE) and Cyber Forensics. We aim to use our technical skill set in Signals Intelligence (SIGINT) and Information Assurance (IA) to support global Cyber operations and mission training.
Job Description
VOR Technology is seeking a senior Information Assurance (IA) Lead/Analyst with specific skills in Certification & Accreditation/Assessment & Authorization (C&A/A&A).
Responsibilities will include the following:
Provide DoD IA policy analysis, and risk-based security recommendations for integrating new systems/applications into the customer's networked enterprise.
Provide mentorship, guidance and task management to junior team members. The candidate will have demonstrative experience supporting DoD/US Government organizations and agencies.
Qualifications
*All Candidates must have a TS/SCI clearance with a Full Scope Polygraph
Must have a minimum ten (10) years experience with the following:
• Managing and executing the full lifecycle of C&A/A&A processes within an IT risk management and compliance tool, such as eMASS and Xacta IA Manager
• Executing C&A/A&A within DoD RMF (DoD 8500, DoD 8510, NIST 800-37/-53), and DCID 6/3 and ICD 503 processes and frameworks
• Developing C&A/A&A documentation such as System Security Plans, Incident Response Plans and Change Management Plans
• Developing local IA policy, continuous monitoring framework and SOPs and ensuring traceability to DoD and Chairman of the Joint Chiefs of Staff policy and instruction, as well as applicable federal regulations and statutes
• Guiding customers through DoD 8500-based annual assessments, and Command Cyber Readiness Inspections (CCRI) processes
• Leading FISMA reporting for DoD customers
• Creating detailed reports on local security posture trends and providing metrics and recommended mitigations that are suitable for both senior leaders and technical audiences
• Developing project plans with critical milestones and deliverables for ongoing C&A/A&A projects
Additional Desired Qualifications:
• DoD 8570 IAT/M-II or above professional certification (CISSP, CISM, GCIH, GCIA)
• eMASS experience is a plus
Additional Information
Education Requirement:
Bachelor's Degree (Computer science, Engineering, Mathematics, Business or related field)
Clearance Requirement:
Active TS/SCI with Full Scope clearance
* US citizenship is required.
EOE/M/F/D/V
Senior Information Assurance (IA) Lead Analyst
Arlington, VA jobs
VOR Technology is a privately held, veteran owned small business that provides Cyber Intelligence Solutions to government, private industry and critical infrastructure. Our areas of expertise include Computer Network Defense (CND), Computer Network Exploitation (CNE) and Cyber Forensics. We aim to use our technical skill set in Signals Intelligence (SIGINT) and Information Assurance (IA) to support global Cyber operations and mission training.
Job Description
VOR Technology is seeking a senior Information Assurance (IA) Lead/Analyst with specific skills in Certification & Accreditation/Assessment & Authorization (C&A/A&A).
Responsibilities will include the following:
Provide DoD IA policy analysis, and risk-based security recommendations for integrating new systems/applications into the customer's networked enterprise.
Provide mentorship, guidance and task management to junior team members. The candidate will have demonstrative experience supporting DoD/US Government organizations and agencies.
Qualifications
*All Candidates must have a TS/SCI clearance with a Full Scope Polygraph
Must have a minimum ten (10) years experience with the following:
• Managing and executing the full lifecycle of C&A/A&A processes within an IT risk management and compliance tool, such as eMASS and Xacta IA Manager
• Executing C&A/A&A within DoD RMF (DoD 8500, DoD 8510, NIST 800-37/-53), and DCID 6/3 and ICD 503 processes and frameworks
• Developing C&A/A&A documentation such as System Security Plans, Incident Response Plans and Change Management Plans
• Developing local IA policy, continuous monitoring framework and SOPs and ensuring traceability to DoD and Chairman of the Joint Chiefs of Staff policy and instruction, as well as applicable federal regulations and statutes
• Guiding customers through DoD 8500-based annual assessments, and Command Cyber Readiness Inspections (CCRI) processes
• Leading FISMA reporting for DoD customers
• Creating detailed reports on local security posture trends and providing metrics and recommended mitigations that are suitable for both senior leaders and technical audiences
• Developing project plans with critical milestones and deliverables for ongoing C&A/A&A projects
Additional Desired Qualifications:
• DoD 8570 IAT/M-II or above professional certification (CISSP, CISM, GCIH, GCIA)
• eMASS experience is a plus
Additional Information
Education Requirement: Bachelor's Degree (Computer science, Engineering, Mathematics, Business or related field)
Clearance Requirement: Active TS/SCI with Full Scope clearance
* US citizenship is required.
EOE/M/F/D/V
Cyber Systems SSO
Washington, DC jobs
is Subject to Contract Award JANUS Research Group is currently seeking a Cyber Systems SSO for a contract to support the Deputy Chief of Staff (DCS, G8. The DCS G-8 is the principal military advisor to the Chief of Staff, Army (CSA) and the Assistant Secretary of the Army, Financial Management and Comptroller (ASA(FMC)) for the Programming phase of the Planning, Programming, Budgeting, and Execution (PPBE) process. The DCS, G-8 coordinates with the Assistant Secretary of the Army, Acquisition, Logistics, and Technology (ASA(ALT)) on all proposed programming and process recommendations related to ongoing and future acquisition programs and science and technology initiatives. The DCS, G-8 coordinates with Army Futures Command (AFC) for program funding for all elements of the future force materiel modernization enterprise.
Position Description: Manages Army cyber capability development within the Intelligence Division. Provides analytical and technical expertise on cyber defense, network operations, and offensive cyber modernization. Develops information papers, briefings, and SPAR/POM inputs addressing capability gaps, performance, and operational integration. Coordinates with ASA(ALT), T2COM, ARCYBER, INSCOM, and ARSTAF to align cyber initiatives with Army and Joint modernization strategies.
Relevant Competencies / Skill Levels:
A Bachelor's Degree in Engineering and/or Business
A minimum of four (4) years of experience and expertise in Force Development duties
Demonstrates expert analytical and technical skills in cyber systems architecture, network defense, and offensive cyber capabilities. Proficient in evaluating system performance, security posture, and modernization impacts to ensure resilient and adaptive cyber operations. Possesses advanced analytical and communication abilities to deliver clear, data-driven assessments that enhance Army cyber capability development and operational readiness
Benefits: 401(k), Paid Time Off (PTO), Paid Holidays, Medical and Dental Plans, Life and Disability insurance, Education Assistance (and more).
JANUS strives to provide opportunities for career growth through training and development. We also offer an attractive comprehensive benefit package to include health and welfare plans and financial products. As part of a total rewards program, employees can benefit from our referral bonus program, and other various employee awards. JANUS Research Group takes pride in our benefit package and rewards program which has earned us the certification of a Great Place to Work
JANUS Research Group provides reasonable accommodation so that qualified applicants with a disability may participate in the selection process. Please advise us of any accommodations you request to express interest in a position by e-mailing: Judy Pagac, Chief Human Resources Officer at **************************** or calling **************. Please state your request for assistance in your message. Only reasonable accommodation requests related to applying for a specific position within JANUS Research Group will be reviewed at the e-mail address and phone number supplied. Thank you for considering a career with JANUS Research Group.
JANUS Research Group participates in the Electronic Employment Verification Program. Please click the E-Verify link below for more information.
E-Verify
JANUS Research Group is an equal opportunity/ affirmative action employer. It is company policy to provide equal opportunity in all areas of employment practice without regard to race, color, religion, sex, sexual orientation, national origin, age, marital status, veteran status, citizenship, or disability.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment qualified individuals without regard to race, color, religion, sex, national origin, protected veteran status or disability.
Cyber Security Analyst 2
Birmingham, AL jobs
+ This position provides support to the Grid Operations and Planning Research area within client Company's Research & Development. + The engineer will support projects and in time lead efforts to deploy and evaluate the performance of emerging technologies in this arena.
+ The position is focused on cyber-physical security research for Transmission and Distribution.
+ The engineer will support cyber-physical security projects with power system and cyber modeling, simulation, and analyses to identify and characterize threats, and vulnerabilities and develop mitigation approaches.
+ Data from various sources and analytics tools will be leveraged to develop models to characterize normal power system and cyber data to facilitate the identification of anomalous events.
+ Working knowledge of intrusion detection, risk assessment frameworks, databases, data structures, computer networking is required as well as an aptitude to apply engineering analysis to solve problems.
**Description:**
+ This position supports the Schatz Grid Visualization and Analytics Center (SGVAC) within client Company's Research & Development department.
+ The SGVAC is an innovation center that facilitates the research, pre-operational development and assessment and demonstration of situational awareness technologies for Transmission and Distribution.
+ Areas of focus include synchrophasor technology, next generation control center functionalities, cyber security testing, new visualization approaches, DERMS platform evaluation, data analytics as well as modeling and simulation including via a Real Time Digital Simulator (RTDS) with hardware-in-the-loop testing capability.
**Qualification Requirements**
+ Experience in cybersecurity, including cyber security modeling and simulation
+ Experience with intrusion detection and risk assessment frameworks is required
+ Experience in power system modeling and simulation
+ Experience with data analytics including machine learning required
+ Experience with computer programming (Python, C#, SQL) desired
**Job Responsibilities:**
+ Develop research plan to evaluate new technology
+ Manage multiple tasks at one time
+ Provide documentation of study assumptions and methods used to arrive at results
+ Provide informative reports and presentations on projects
+ Some overnight travel may be required but this is not extensive.
**Other Knowledge, Skills & Abilities**
+ Must demonstrate good communication skills, both internal and external to the company
+ Must have excellent organizational skills
+ Must possess analytical skills as well as the ability to manage multiple projects simultaneously
+ Must work well in a team environment
+ Must have the ability to manage your own work schedule and work with limited direction
+ Must have strong initiative - a self-starter
+ Must be great at problem solving
**Education:**
+ Bachelors in computer science, computer engineering, cyber security, information systems, electrical engineering or related field required
+ Advanced degree in EE, computer science or other related fields strongly preferred.
**About US Tech Solutions:**
US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit *********************** (*********************************** .
US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, colour, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Cyber Network Defense Analyst
Hampton, VA jobs
We're seeking a Cyber Network Defense Analyst (CND) to support the Intelligence, Surveillance, Reconnaissance (ISR) Wing Security Office and the Distributed Common Ground System (DCGS) Processing, Exploitation, Dissemination (PED) Operations Center (DPOC).
Job Responsibilities:
Performs forensic analysis of digital information and gathers and handles evidence.
Identifies network computer intrusion evidence and perpetrators.
Investigates computer fraud or other electronic crimes, crack files and system passwords, detects steganography and recovers deleted, fragmented and corrupted data from digital media of all types.
Ensures chain of custody and control procedures, documents procedures and findings in a manner suitable for courtroom presentation and prepares comprehensive written notes and reports.
May be required to testify in court as expert witnesses.
Required Skills and Experience:
BA/BS
3+ years of network operations experience
Active TS/SCI
CompTIA Security+
CompTIA Cybersecurity Analyst (CYSA)
Shift work required
Preferred Skills and Experience:
Working knowledge of AF DCGS and AF ISR operations is desired
Spectrum is proud of our diverse workforce and diligently committed to remaining an Equal Opportunity Employer. Spectrum governs all employment related decisions without regard to an individual's race, color, sex, religion, national origin, age, disability, veteran status or any other protected classification.
[EEO/AA/Protected Veterans/Individuals with Disability employer].
Work schedule: 10-hour rotational shift work. Rotations are quarterly between day and mid shifts and monthly between weekday and weekend shifts.
Auto-ApplyInformation Security Analyst
Washington, DC jobs
Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Title: Information Security Operations Center - Incident Handler III
Location: Washington, DC
Duration: 12+ Months
Job Description:
Essential Job Functions:
• Monitor Security Events from IDS, SIEM, etc.
• Log tickets to the Ticketing System
• Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members
• Perform triage on alerts from all sources including Monitored Email Distribution Lists
• Participate in rotating weekly shift supporting off hours and weekend activity (24x7)
• Produce ad hoc reports and other ad hoc tasks
Qualifications
Required Skills/Abilities:
• Monitoring skills related to IDS and SIEM
• Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts
• Understanding of Windows Registry, File system, etc.
• Hands-on knowledge of Network Packet Analysis using tools
• Ability to work with team members with varying levels of technical skills and diverse international backgrounds
• Strong understanding of Networking and Operating systems concepts
• Ability to adapt to and function in a project environment with multiple timetables and changing priorities
• Ability to learn new concepts and approaches in Analyzing Security Incidents.
• Good communication skills (Verbal and Written)
Educational Qualifications and Experience:
• Education: Bachelor's degree in Computer Science or Information Systems
• Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling
• Experience with Firewalls and information security technologies
• Experience with CERT/CSIRT/CIRT/SOC
Certification Requirements:
Any two certifications would be a plus.
CEH, Security +, CCNA
Response activities, including containment, remediation, and root cause analysis
Bachelor's degree and 5+ years of information security experience
Experience in malware remediation and containments
Hands on experience of Incident Response /Malware analysis
Essential Job Functions:
§ Perform advanced Malware Analysis, along with Incident Response
§ Generate detailed Malware Analysis reports on PE and other common file structure samples
§ Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis
§ Assist OIS in Identifying zero-day/vulnerable applications and impact
Experience Matrix for Levels:
• Level I - 2+ years of experience
• Level II - 5+ years of experience
• Level III - 7+ years of experience
Note:
The specific shift he wants to get covered is the 12pm-8pm EST window
Strong experience in SOC environment and great soft skills/customer service
Required people who can come for an in-person interview
Additional Information
For more information, Please contact
Siva Kumar
************
Information Security Analyst
Washington, DC jobs
Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Title: Information Security Operations Center - Incident Handler III
Location: Washington, DC
Duration: 12+ Months
Job Description:
Essential Job Functions:
• Monitor Security Events from IDS, SIEM, etc.
• Log tickets to the Ticketing System
• Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members
• Perform triage on alerts from all sources including Monitored Email Distribution Lists
• Participate in rotating weekly shift supporting off hours and weekend activity (24x7)
• Produce ad hoc reports and other ad hoc tasks
Qualifications
Required Skills/Abilities:
• Monitoring skills related to IDS and SIEM
• Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts
• Understanding of Windows Registry, File system, etc.
• Hands-on knowledge of Network Packet Analysis using tools
• Ability to work with team members with varying levels of technical skills and diverse international backgrounds
• Strong understanding of Networking and Operating systems concepts
• Ability to adapt to and function in a project environment with multiple timetables and changing priorities
• Ability to learn new concepts and approaches in Analyzing Security Incidents.
• Good communication skills (Verbal and Written)
Educational Qualifications and Experience:
• Education: Bachelor's degree in Computer Science or Information Systems
• Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling
• Experience with Firewalls and information security technologies
• Experience with CERT/CSIRT/CIRT/SOC
Certification Requirements:
Any two certifications would be a plus.
CEH, Security +, CCNA
Response activities, including containment, remediation, and root cause analysis
Bachelor's degree and 5+ years of information security experience
Experience in malware remediation and containments
Hands on experience of Incident Response /Malware analysis
Essential Job Functions:
§ Perform advanced Malware Analysis, along with Incident Response
§ Generate detailed Malware Analysis reports on PE and other common file structure samples
§ Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis
§ Assist OIS in Identifying zero-day/vulnerable applications and impact
Experience Matrix for Levels:
• Level I - 2+ years of experience
• Level II - 5+ years of experience
• Level III - 7+ years of experience
Note:
The specific shift he wants to get covered is the 12pm-8pm EST window
Strong experience in SOC environment and great soft skills/customer service
Required people who can come for an in-person interview
Additional Information
For more information, Please contact
Siva Kumar
************
Information Security Analyst
McLean, VA jobs
Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Description
The position is within the Information Security Identity and Access Management (IAM) team.
This position will be responsible for user provisioning of application & infrastructure access as well as application account management; working knowledge of platform provisioning (groups/roles/accounts/permissions), this includes understanding of platform or application meta-data, or fine grained entitlement details.
They need to identify risks and work out possible solutions with the customer and inform management as necessary, while handling tasks assigned to them with little or no supervision.
They are expected to identify task inefficiencies and provide ideas for solutions, including the ability to assist with the automation of manual and semi-manual processes via development and scripting.
Qualifications
Strong understanding of Identity and Access Management (IAM) concepts
• Provisioning access to applications and infrastructure platforms within our SLA.
• Handling of miscellaneous support requests.
• 24/7 on call support on rotational basis.
• Handle deployment related activities which is often after hours and/or weekends.
• Incorporating process changes and updates into the Standard Operation Procedures.
• Troubleshoot application/platform access issues and escalate to Tier 3 Support as necessary.
• Training other staff on provisioning and daily tasks.
• The gathering of requirements and testing for new application integration into Identity Management Solution.
• 3 - 5 years of experience with business application or infrastructure support on the following platforms: Windows, UNIX (Solaris, Linux, AIX), Web Technologies (WebLogic, Web Methods, Apache, Tomcat, MQ, IIS, etc).
• 3 - 5 years of collective experience with databases (Sybase, DB2, SQL Server, Oracle) and security (firewall, AD, TAM, LDAP, certificate).
• Experience providing direct support to IT business application and related infrastructure teams in a complex multi-platform operating environment
• 3 - 5 years of strong Java, J2EE development experience, including Java frameworks such as Spring MVC, JSF, Struts, etc.
Basic Requirements:
• Bachelor's degree in Engineering, Computer Science, Information Technology, related field or equivalent work experience.
• Experience working in a fast paced team environment and managing priorities with minimal supervision
• Strong organizational skills and the ability to multitask; can set priorities and follow a timeline
• Excellent written and oral communications
• Proficiency with Microsoft Excel skills, with strong excel analytical experience.
• Strong familiarity / experience with MS Office tools, Visio and SharePoint
• Strong interpersonal and communication skills, up to and including executive
• Experience using analytical and problem solving skills
• Experience negotiating effectively and facilitating conflict resolution
Preferred Skills:
• 3 - 5 years of application development or support coupled with infrastructure experience.
• 3 - 5 years of prior working experience in automating manual and semi-automatic processes via scripting languages such as PowerShell, Perl or Python.
• Strong IT systems troubleshooting analysis abilities
• Experience with SailPoint IdentityIQ Suite
• Experience with CyberArk Application Identity Manager or other Password Management utility.
• CISSP certification a plus
• J2EE certification a plus
Additional Information
If you are interested, Please contact
Siva Kumar
************
Information Security Analyst
McLean, VA jobs
Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Description
The position is within the Information Security Identity and Access Management (IAM) team.
This position will be responsible for user provisioning of application & infrastructure access as well as application account management; working knowledge of platform provisioning (groups/roles/accounts/permissions), this includes understanding of platform or application meta-data, or fine grained entitlement details.
They need to identify risks and work out possible solutions with the customer and inform management as necessary, while handling tasks assigned to them with little or no supervision.
They are expected to identify task inefficiencies and provide ideas for solutions, including the ability to assist with the automation of manual and semi-manual processes via development and scripting.
Qualifications
Strong understanding of Identity and Access Management (IAM) concepts
• Provisioning access to applications and infrastructure platforms within our SLA.
• Handling of miscellaneous support requests.
• 24/7 on call support on rotational basis.
• Handle deployment related activities which is often after hours and/or weekends.
• Incorporating process changes and updates into the Standard Operation Procedures.
• Troubleshoot application/platform access issues and escalate to Tier 3 Support as necessary.
• Training other staff on provisioning and daily tasks.
• The gathering of requirements and testing for new application integration into Identity Management Solution.
• 3 - 5 years of experience with business application or infrastructure support on the following platforms: Windows, UNIX (Solaris, Linux, AIX), Web Technologies (WebLogic, Web Methods, Apache, Tomcat, MQ, IIS, etc).
• 3 - 5 years of collective experience with databases (Sybase, DB2, SQL Server, Oracle) and security (firewall, AD, TAM, LDAP, certificate).
• Experience providing direct support to IT business application and related infrastructure teams in a complex multi-platform operating environment
• 3 - 5 years of strong Java, J2EE development experience, including Java frameworks such as Spring MVC, JSF, Struts, etc.
Basic Requirements:
• Bachelor's degree in Engineering, Computer Science, Information Technology, related field or equivalent work experience.
• Experience working in a fast paced team environment and managing priorities with minimal supervision
• Strong organizational skills and the ability to multitask; can set priorities and follow a timeline
• Excellent written and oral communications
• Proficiency with Microsoft Excel skills, with strong excel analytical experience.
• Strong familiarity / experience with MS Office tools, Visio and SharePoint
• Strong interpersonal and communication skills, up to and including executive
• Experience using analytical and problem solving skills
• Experience negotiating effectively and facilitating conflict resolution
Preferred Skills:
• 3 - 5 years of application development or support coupled with infrastructure experience.
• 3 - 5 years of prior working experience in automating manual and semi-automatic processes via scripting languages such as PowerShell, Perl or Python.
• Strong IT systems troubleshooting analysis abilities
• Experience with SailPoint IdentityIQ Suite
• Experience with CyberArk Application Identity Manager or other Password Management utility.
• CISSP certification a plus
• J2EE certification a plus
Additional Information
If you are interested, Please contact
Siva Kumar
************
Security Engineer (Hybrid)
Information systems security officer job at SiloSmashers
Clearance: Must be a U.S. citizen and able to obtain and maintain DHS suitability clearance, as required by federal contract.
The Security Engineer will provide expertise in designing, implementing, and maintaining security controls across DHS CISA's IT and cloud environments. This role supports vulnerability management, Zero Trust initiatives, and secure cloud adoption.
Responsibilities:
Conduct vulnerability assessments and support remediation efforts.
Implement and maintain secure configurations in AWS GovCloud and Azure Gov environments.
Support Zero Trust architecture adoption and integration.
Develop and maintain security documentation and technical standards.
Collaborate with engineers, developers, and analysts to ensure secure system design and operations.
Qualifications:
Bachelor's degree in Cybersecurity, Computer Science, or related field.
5+ years of experience in security engineering or cybersecurity operations.
Familiarity with DHS, NIST, and federal cybersecurity standards.
Industry certifications such as CEH, CISSP, or Security+ preferred.
Strong analytical, problem-solving, and communication skills.